In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency is the best objective and no error was recorded in prediction of location and small error in detecting damage value. Also the result show that the genetic algorithm method are efficient indicating and quantifying single and multiple damage with high precision, and the prediction error for the CGA are less than corresponding value for the BGA.
Abstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col
... Show MoreECG is an important tool for the primary diagnosis of heart diseases, which shows the electrophysiology of the heart. In our method, a single maternal abdominal ECG signal is taken as an input signal and the maternal P-QRS-T complexes of original signal is averaged and repeated and taken as a reference signal. LMS and RLS adaptive filters algorithms are applied. The results showed that the fetal ECGs have been successfully detected. The accuracy of Daisy database was up to 84% of LMS and 88% of RLS while PhysioNet was up to 98% and 96% for LMS and RLS respectively.
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreMixing this strategy with a qualitative research design and an idea known as AI-supported journalism, the paper is going to approach the requirements of how AI technologies may transform journalism content and culture in a way beyond what one anticipates; therefore, enabling more of it to reach an audience. The current research used descriptive research design to investigate the potential applications of the AI tools that mediate civilizational conversation and a structured questionnaire to media professionals. AI-driven journalism can promote peaceful cohabitation and mutual respect and thus act as a bridge between cultures, the research said. The piece even goes on to mention the need for media establishments and civil soc
... Show MoreWarm dark matter (WDM) models offer an attractive alternative to the current cold dark matter (CDM) cosmological model. We present a novel method to differentiate between WDM and CDM cosmologies, namely, using weak lensing; this provides a unique probe as it is sensitive to all of the “matter in the beam,” not just dark matter haloes and the galaxies that reside in them, but also the diffuse material between haloes. We compare the weak lensing maps of CDM clusters to those in a WDM model corresponding to a thermally produced 0.5 keV dark matter particle. Our analysis clearly shows that the weak lensing magnification, convergence, and shear distributions can be used to distinguish
Moisture-induced damage is a serious problem that severely impairs asphaltic pavement and affects road serviceability. This study examined numerous variables in asphalt concrete mixtures to assess their impact on moisture damage resistance. Mix design parameters such as the asphalt content (AC) and aggregate passing sieve No. 4 (PNo. 4) were considered as variables during this study. Additionally, hydrated lime (HL) was utilized as a partial substitute for limestone dust (LS) filler at 1.5% by weight of the aggregate in asphalt concrete mixtures for the surface layer. This study also investigated the potential enhancement of traditional asphalt binders and mixtures by adding nano-additives, specifically nano-silica oxide (NS) and na
... Show MoreBackground: Vascular tumors and malformations, comprising a broad category of lesions often referred to as vascular anomalies. Hemangioma, represents a variety of vascular lesions (both malformations and tumor), while lobular capillary hemangioma is a common vascular lesion of the skin and mucous membranes that occurs mainly in children and young adults. Lymphangiomas are malformations of the lymphatic system. At the level of light microscopy the small lymphatics vessels may be similar to capillaries and sometimes are only tentatively identified by the nature of their contents or by immunohistochemical staining procedure. This study aimed to assess the vascular and lymphatic vessels density in benign vascular lesions using CD34 and D2-40 im
... Show MoreIn this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A comparison between numerical and experimental data, illustrated
... Show MoreIn this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A compari